<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-rpki-repository-problem-statement-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="RPKI Repository Problem Statement and Analysis">RPKI Repository Problem Statement and Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-rpki-repository-problem-statement-01"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Su" fullname="Yingying Su">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>suyy@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Fu" fullname="Yu Fu">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>fuy186@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="February" day="25"/>
    <area>General [REPLACE]</area>
    <workgroup>sidrops</workgroup>
    <abstract>
      <?line 94?>

<t>With the widespread deployment of Route Origin Authorization (ROA) and Route Origin Validation (ROV), Resource Public Key Infrastructure (RPKI) is vital for securing inter-domain routing. RPKI uses cryptographic certificates to verify the authenticity and authorization of IP address and AS number allocations and the certificates are stored in the RPKI Repository. This document conducts the data-driven analysis of the RPKI Repository, including a survey of worldwide AS administrators and a measurement and analysis of the existing RPKI Repository. This document finds that the current RPKI Repository architecture is sensitive to failures and lacks of scalability. An attack or downtime of any repository Publication Point (PP) will prevent RPs from obtaining complete RPKI object views. Furthermore, since the current RPKI Repository is not tamper-resistant, RPKI authorities can easily manipulate RPKI objects without consent from subordinate INR holders. This document also defines the key requirements for a reliable, scalable, and secure RPKI Repository.</t>
    </abstract>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>To establish a trustworthy mapping between AS numbers and IP prefixes, RPKI arranges the Certificate Authorities (CAs) in a hierarchy that mirrors IP address allocation, and five RIRs are trust anchors. Each CA in RPKI holds a Resource Certificate (RC) issued by its parent authority, which attests to a binding of the entity's public key to a set of allocated Internet Number Resources (INRs, such as IP address blocks and AS numbers). CAs can issue subordinate RCs to reallocate their resources or issue ROAs (leaf nodes) to authorize ASes to originate specific IP prefixes.</t>
      <t>As shown in <xref target="repo-arc"/>, each CA in RPKI will upload the objects it signs, such as manifests, CRLs, RCs, and ROAs, to the repository Publication Point (PP) it specifies. These PPs naturally form a tree structure that mirrors the RPKI certificate tree and collectively form the global RPKI Repository. Relying Parties (RPs), as entities that help ASes request RPKI data, periodically traverse RCs from five root RCs (held by RIRs) and access the PPs specified in their Subject Information Access (SIA) fields to fetch all RPKI objects, and then validate them. Finally, the ASes served by the RPs can use the verified ROAs to guide routers to perform ROV.</t>
      <figure anchor="repo-arc">
        <name>The RPKI certificate tree and RPKI Repository structure.</name>
        <artwork><![CDATA[
           +-------+ 
           |  RC A |                   +-----------------+          
           |       |                   |        PP       |
           |  SIA--+------------------>| RC B,RC C,ROA A |-----+
           +-------+                   +-----------------+     |
          /    |    \                                          |
         /     |     \                                         |
        /      |      \                                        |
 +----+\/+ +-+\/+--+ +\/+----+                                 |
 |  RC B | | ROA A | |  RC C |         +-----------------+     |
 |       | |       | |       |         |        PP       |     |
 |  SIA  | |       | |  SIA--+-------->|       RC D      |-----|             
 +----|--+ +-------+ +-------+         +-----------------+     | 
    | |                  |                                     |
    | |                  |             +-----------------+     |
    | +------------------|------------>|        PP       |     |      
    |                    |             |       ROA B     |-----|
 +-+\/+--+           +-+\/+--+         +-----------------+     | 
 | ROA B |           |  RC D |         +-----------------+     | 
 |       |           |       |         |        PP       |     |    
 |       |           |  SIA--+-------->|       ....      |-----+
 +-------+           +-------+         +-----------------+     |   
                                                       +-----+\/+-+
                                                       |    RP    |
                                                       +----------+
]]></artwork>
      </figure>
      <t>With the increasing deployment of RPKI, in June 2024, ROAs cover 42.40% of active IPv4 addresses and 57.97% of active IPv6 addresses. The number of independent repository instances has grown to 63. This document provides measurements and analysis of the reliability, scalability, and security of the RPKI Repository architecture. The measurement includes a survey with the AS administrators of 2,500 randomly selected ROA-deployed ASes and a measurement of the RPKI Repository deployment status. The survey mainly focuses on the future consideration of adopting delegated RPKI and considerations regarding malicious behavior from RPKI authorities. We have observed that the current RPKI Repository lacks the ability to provide reliable services to RPs. RPKI allows certificates issued by a CA to be stored only at the PP operated by that CA, which means that any failure of a PP can hinder RPs from obtaining complete RPKI data. Then, as delegated RPKI becomes more popular, an increasing number of CAs choose to maintain their own repository instances. However, some of these repositories lack robust, secure, and reliable infrastructure. Furthermore, the proliferation of repositories will affect the scalability of RPKI, as RPs need to traverse all PPs to refresh their local caches. Additionally, with the rising deployment rates of ROA and ROV, RPKI plays an increasingly important role in the inter-domain routing. Consequently, AS administrators are more concerned about RPKI security, especially the potential malicious behavior of RPKI authorities.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>It is assumed that the reader is familiar with the terms and concepts described in "A Profile for Resource Certificate Repository Structure" <xref target="RFC6481"/>, "The RPKI Repository Delta Protocol (RRDP)" <xref target="RFC8182"/>, and "An Infrastructure to Support Secure Internet Routing" <xref target="RFC6480"/>.</t>
      </section>
    </section>
    <section anchor="reliability-analysis">
      <name>Reliability Analysis</name>
      <t>Although the current RPKI Repository is globally distributed, each CA only stores the RPKI objects it issues in the unique PP it runs. If any PP fails (malfunctions or is attacked), RPs will not be able to fetch the RPKI objects issued by its CA, and the integrity of the global RPKI object view cannot be guaranteed.</t>
      <t>As of August, 2024, there are 42,950 RCs and 303,918 ROAs in RPKI Repository. For each RC, we extracts the SIA field that records the URI of its HTTPS-based RRDP file (Since all PPs now support RRDP and serve RPs through RRDP files, the analysis of the RPKI Repository focuses primarily on RRDP Repository). The result shows that there are currently 63 independent repository instances (SIA fields of RCs held by the same entity may share the same PP, therefore, the number of repositories is much lower than that of RCs).</t>
      <t>Next, the measurement focuses on the ASes where the repositories are located, their IP addresses, and whether they utilize CDNs. We uses 2,000 globally distributed DNS resolvers to resolve repositories' domain names, with the aim of finding the CNAME and all IP address records for each repository. Then, we use the IP-to-AS mapping information maintained by RIPE NCC <xref target="routing-history"/> to obtain the AS where each PP is located.</t>
      <t>Typically, CDN service providers will display their information in the domain name and CNAME record, such as including "cdn.cloudflare.net" or specify the CDN in the X-Via-CDN field, cache status field, or Server field in the HTTPS headers. In addition, if CDN acceleration is used, the latency of requesting HTTPS services from different geographic locations around the world will be relatively low. Therefore, it can determine whether the PP services are hosted on CDNs from the following aspects: (1) Whether the domain name and CNAME record contain information about CDN service providers; (2) The number of IP addresses returned by DNS resolvers and the geographical distribution of these IP addresses; (3) Whether the HTTPS request headers contain information about mainstream CDN providers; (4) The latency of accessing RRDP files from different geographic locations around the world.</t>
      <t>Measurement results show that although RRDP enables the use of Content Distribution Networks (CDNs) infrastructure for resilient service, only 9 out of 63 repositories are hosted in CDNs, with 8 being hosted on Cloudflare AS13335 and 1 on Amazon AS16509. It also shows that out of 63 repositories, 60 of them are hosted in a single AS. It means that the accessibility of these repositories is highly dependent on the reachability of a single AS. Worse still, among the repositories whose corresponding ASes have deployed ROAs, there are 14 of them carry the ROA of the ASes in which they are located. It means that once the repository goes down and the RPs cannot fetch its ROAs, the route of the AS that the repository locates in may be downgraded by ROV adopters. Then, even if the repository is restored, those ROV adopters still cannot access the repository, in which case the access of the repository depends on the reachability of the AS it locates in, while the reachability of the AS also depends on the access of the repository.</t>
      <t>Real-world incidents of repository breakdowns do occur at times. On 6 April 2020, the repository maintained by RIPE NCC suffered a sudden increase in connection to service <xref target="RIPE-downtime"/>, resulting in it appearing as down to many RPs for 7 hours (RIPE's services are already hosted on CDNs). On 15 May 2020, the Japan operated repository was out of service for 10 hours due to hardware failure <xref target="service-outage"/>, and between 26 Jan 2022 and 2 Feb 2022, due to full disk space, all ROAs in its repository again became invalid <xref target="disk-outage"/>. During 10 July 2024 to 12 July 2024, we also found that RPKI data synchronized through Routinator <xref target="routinator"/> once again had missing parts from RIPE NCC.</t>
    </section>
    <section anchor="scalability-analysis">
      <name>Scalability Analysis</name>
      <t>In current RPKI infrastructure, refreshing the local cache of each RP involves traversing all repositories to fetch the updated RPKI objects. However, RPKI Repository has grown from 5 repositories run by five RIRs to more than 60 repositories and is expected to increase dramatically with the further deployment of ROA.</t>
      <t>On the one hand, with a deeper understanding of RPKI, ROA deployers prefer to adopt delegated RPKI to flexibly control their RPKI objects. In the survey, 45.3% of the AS administrators using hosted RPKI say they have plans to run their own repositories for flexible certificate signing and control. The result shows that delegated RPKI will emerge as a trend, and the number of independent repositories will inevitably increase. The work <xref target="beyond-limits"/> predicts that when ROA is fully deployed, the number of repositories will reach 10K and there will be 140K active RPs, the RPKI snapshot download would easily exceed 1 hour (on the premise that each repository is well accessible). Since RPs are required to check the updates of all repositories when refreshing their local caches, the increasing number of repositories will result in higher refresh costs. It may prevent RPs from obtaining routing information in a timely manner, and also prohibits the release of use cases such as temporary ROAs to enable ISPs to perform tactical traffic engineering to ease congestion.</t>
      <t>On the other hand, RPKI Repository is designed without a strict admission mechanism, allowing entities to apply for RC from RIRs or other RPKI CA entities, register as delegated CAs, and then operate repositories with a small fee and identity verification. Therefore, some repositories for unwanted purposes (measurement, attack experiments, etc.) are gradually emerging. Furthermore, the low barriers to running repositories and joining RPKI Repository will introduce unforeseen risks to RPs. For example, a malicious CA can create a large number of descendant RCs and operate numerous repositories to make RPs endlessly retrieve repositories, thus exhausting and paralyzing RPs. Although the most popular RP software, Routinator <xref target="routinator"/>, has set the default value for the maximum searchable RPKI-tree depth to 32 in its latest version 0.14.1, and the RPKI-client has set the default value to 12, neither has provided a value for RPKI-tree width (as it is difficult to set a reasonable threshold). Similarly, it is also challenging for RP softwares to clearly limit the maximum number of accessible repositories. In addition, a series of recent academic works have emerged that exploit repository vulnerabilities to cause repository downtime, thereby preventing it from providing normal services to RPs <xref target="behind-the-scenes"/>. There are also works <xref target="beyond-limits"/><xref target="stalloris"/> that manipulate malicious repositories to attack RPs, thus obstructing the synchronization of RPKI data.</t>
      <t>In addition, with the increasing rate of ROV deployment, more and more RPs will connect to RPKI Repository. It will undoubtedly increase the burden on the repositories. In summary, as RPKI deployment progresses further, RPs will need to access more repositories, and repositories will need to serve more RPs. This increase in the number of bidirectional connections will threaten the scalability of the RPKI system.</t>
    </section>
    <section anchor="security-analysis">
      <name>Security Analysis</name>
      <t>In current RPKI infrastructure, RPKI authority (CA and its corresponding repository manager) uploads the RCs and ROAs it signs for subordinate INR holders to the repository it specified. It means that RPKI authorities control the signing and management of RPKI objects in their repositories and have significant unilateral power. The disproportionate division of power between RPKI authorities and INR holders will poses three issues:</t>
      <t>(1) Since the current RPKI Repository is not tamper resistant, authorities can unilaterally undermine any RPKI objects without consent from subordinate INR holders. Malicious or breached authorities can perform arbitrary operation on INR holders' certificates, such as deletion, corruption, modification, or revocation (see <xref target="RFC8211"/> for more details). These operations often involve diminishing the set of INRs associated with the affected INR holders. A malicious RPKI authority can also compromise RPs, for example, showing incomplete or inaccurate RPKI object views to RPs.</t>
      <t>(2) INR holders and RPs can only rely on RPKI authorities without the ability to verify that their security requirements are being met. Specifically, INR holders cannot know if their RPKI objects are securely stored in the authorities' repositories and can be publicly seen and fetched by all RPs; RPs cannot verify the integrity and accuracy of the RPKI objects they synchronize from RPKI Repository.</t>
      <t>(3) The history of RPKI objects is not easily auditable. A complete longitudinal view of RPKI objects is necessary to defend against malicious manipulation of the RPKI Repository and to resolve conflicts between authorities and INR holders. Although RPs can periodically fetch RPKI objects to keep track of their historical versions, it is costly, without any guarantee of completeness. Since RPKI lacks a trustworthy historical RPKI object record, it is also challenging, if not impossible, to hold authorities accountable even if attacks are detected after the fact.</t>
      <t>In the survey, 44.1% of the AS administrators explicitly expressed concerns about malicious RPKI authorities (11.5% of them chose "not sure"). Two administrators provided additional feedback, indicating that they consider the threat from the RPKI authorities to be the most serious problem. One of them said they had lost all their ROAs due to administrative/human reasons. It can be seen that threats from RPKI authorities are also widely recognized in the industry.</t>
    </section>
    <section anchor="summary-problems-of-the-current-rpki-repository">
      <name>Summary: Problems of the current RPKI Repository</name>
      <t>Based on the measurement and analysis described in the previous section, this section summarizes the main problems of the current RPKI Repository and the key reason behind these issues: the binding of the repository PP with the CA.</t>
      <section anchor="p1-every-rpki-object-is-a-singleton-in-rpki-repository">
        <name>P1: Every RPKI object is a singleton in RPKI Repository.</name>
        <t>Although the current RPKI Repository is globally distributed, RPKI does not provide distributed storage for RPKI objects. The binding of PP and CA causes each RPKI objects to be stored only in the PP run by the CA that issued the object, instead of being stored in multiple repository nodes. Therefore, the current RPKI Repository cannot guarantee that RP can obtain complete RPKI data when some repository nodes fail. Even worse, the singleton nature of RPKI objects also introduces unwanted interdependence between the accessibility of a CA’s PP and the reachability of the AS that the PP locates. Since RPKI ensures the routing security and reachability of ASes, it is fair to expect PPs to remain accessible during any incident when corresponding ASes become unreachable.</t>
      </section>
      <section anchor="p2-rpki-repository-is-costly-in-rp-refreshing">
        <name>P2: RPKI Repository is costly in RP refreshing.</name>
        <t>Refreshing the local cache of each RP involves traversing all repositories to fetch the updated RPKI objects. However, the binding of the repository PP to the CA causes the number of repository instances to increase dramatically with the further deployment of ROA (as the number of CAs that hold RCs increase). Furthermore, as AS administrators gain a deeper understanding of RPKI technology, delegated RPKI has emerged as a trend, CAs are more willing to maintain the repository PP themselves to achieve more flexible certificate signing and management. The growth in the number of repository instances increases the cost of RP refreshes, the growth in the number of RPs brings burdens to repositories, and both will threaten the scalability of RPKI.</t>
      </section>
      <section anchor="p3-unilateral-reliance-on-authority">
        <name>P3: Unilateral reliance on authority.</name>
        <t>The current RPKI authority (CA) not only operates a certificate engine but also operates a publication repository to store all RPKI objects it signs. It means that although the RPKI authority issues certificates to subordinate INR holders, the management of these certificates (especially their storage and distribution) is entirely controlled by the RPKI authority. The current RPKI Repository architecture exacerbates the power imbalance between the RPKI CA and subordinate INR holders and may also lead to RPs being deceived by receiving inaccurate or incomplete RPKI data from malicious RPKI authorities. However, INR holders and RPs have no choice but to rely unilaterally on the RPKI authority. This unilateral reliance prevents RPKI from proactively defending against the threats from malicious RPKI authorities. Moreover, it is also challenging to provide a complete and trustworthy longitudinal view of RPKI objects for post-incident audits, as the RPKI data is entirely controlled by the CA that signed it.</t>
      </section>
    </section>
    <section anchor="new-requirements-for-rpki-repository">
      <name>New Requirements for RPKI Repository</name>
      <t>The following requirements are identified for a reliable, scalable and secure RPKI Repository architecture.</t>
      <section anchor="requirement-1-truly-distributed-storage">
        <name>Requirement 1: Truly Distributed Storage</name>
        <t>A truly distributed storage model is needed for RPKI Repository to provide reliable services for tens of thousands of RPs.</t>
        <t>It means that Resource Certificate (RC) and ROAs are no longer only stored at the repository operated by the CA that issued them, but can be stored at multiple RPKI Repository nodes (PP or other names). The truly distributed storage architecture breaks the singleton nature of RPKI objects. It ensures that any single point of failure in the RPKI Repository nodes will not affect the integrity of RPKI snapshot retrieval by RPs. Additionally, since RPKI Repository nodes are located in different ASes and a single RPKI object can be stored on multiple nodes, the unwanted interdependence between the accessibility of a PP's objects and the reachability of the PP's AS will be broken. Since RPKI ensures the routing security and reachability of ASes, it is fair to expect RPKI objects to remain accessible during any incident when the Repository node or its corresponding AS become unreachable.</t>
      </section>
      <section anchor="requirement-2-admission-mechanism">
        <name>Requirement 2: Admission Mechanism</name>
        <t>An admission mechanism is needed to effectively limit the unconstrained expansion of RPKI repository instances and enhance the scalability of RPKI infrastructure.</t>
        <t>As AS administrators gain a deeper understanding of RPKI technology, delegated RPKI has emerged as a trend, the number of repository instances has grown more than 12 times in the past five years. The rapid growth in the number of repositories increases the cost of RP refreshes and threatens the scalability of RPKI. Furthermore, since each repositories connects to all RPs in the world, the low barriers to running repositories and joining RPKI Repository will introduce unforeseen risks to RPs because some repositories may emerge with unexpected intentions. Regardless, RPs should ensure they establish connections with trusted and reliable nodes. Therefore, a secure and scalable RPKI Repository needs an admission mechanism to raise the threshold for operating repository nodes. For example, the addition of a new repository node should be reviewed by existing node members or other trusted entities. The review can include verifying node's real identity, the reputation of the node operator, and whether it can provide a robust, secure, and reliable service to RPs, among other factors.</t>
        <t>To implement an admission mechanism, it may be necessary to first implement "Decoupled from RPKI Authorities", because once repository nodes are bound to CAs, each CA has the right or need to operate its own repository.</t>
      </section>
      <section anchor="requirement-3-decoupled-from-rpki-authorities">
        <name>Requirement 3: Decoupled from RPKI Authorities</name>
        <t>RPKI Repository nodes should be decoupled from RPKI authorities (CAs).</t>
        <t>It means that the PP is no longer bound to a specific CA. The CA only operates a certificate engine, not a publication repository, and the signing and management (especially storage) of the certificates will be separated. The operation of the RPKI Repository can be delegated to third-party entities (independent of CAs or subordinate INR holders), such as large Internet Service Providers capable of providing stable and reliable certificate storage and synchronization services to INR holders and RPs. Then, INR holders will no longer be required to store their certificates in the PPs operated by the upper-level CAs but can freely control the storage and management of their certificates, for example, upload their certificates to the repository nodes they trust. In this way, RPKI can empower INR holders with proactive control over their certificate management, including storage and even revocation, achieving a fair balance of rights between CAs and subordinate INR holders. This proactive control ensures that INR holders are not solely reliant on RPKI authorities, preventing potential abuse or unilateral actions that could compromise the authenticity of their certificates, such as deletion, corruption, modification, or unauthorized revocation.</t>
        <t>Additionally, decoupling certificate issuance and certificate management can effectively prevent the repository nodes from growing significantly as the number of CAs increases. After all, it is reasonable for the RPKI certificate chain to become wider and deeper, but not for the RPKI Repository.</t>
      </section>
      <section anchor="requirement-4-be-compatible-with-current-rpki">
        <name>Requirement 4: Be Compatible with Current RPKI</name>
        <t>Since the current RPKI is mature and widely deployed, the new RPKI Repository should not modify the RPKI hierarchical certificate issuance architecture and should not affect the existing RPKI certificate validation or the ROV process. It also should be compatible with current RPKI Repository architecture and supports incremental deployment.</t>
      </section>
    </section>
    <section anchor="ethical-considerations">
      <name>Ethical Considerations</name>
      <t>This section will outline the ethical considerations regarding the RPKI Repository measurement and the worldwide survey. First, we strictly limited the rate and number of DNS resolving packets (sending 130,000 packets over 24 hours) to avoid causing much burden on the Internet. For IP-to-AS mapping, we used open-source data provided by RIPE NCC. We conducted access experiments on the RPKI Repository from six globally distributed probes (India, Dubai, Silicon Valley, Frankfurt, Beijing, and São Paulo), with each RPKI repository being accessed fewer than 10 times to avoid DDoS attacks on the repositories. For the survey, we obtained the contact information of AS administrators from open-source WHOIS mailing lists and provided an option for administrators to opt out of the survey. We did not disclose any additional information about the participating administrators or their feedback and ensured that their responses would be used solely for research.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC8211">
          <front>
            <title>Adverse Actions by a Certification Authority (CA) or Repository Manager in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document analyzes actions by or against a Certification Authority (CA) or an independent repository manager in the RPKI that can adversely affect the Internet Number Resources (INRs) associated with that CA or its subordinate CAs. The analysis is done from the perspective of an affected INR holder. The analysis is based on examination of the data items in the RPKI repository, as controlled by a CA (or an independent repository manager) and fetched by Relying Parties (RPs). The analysis does not purport to be comprehensive; it does represent an orderly way to analyze a number of ways that errors by or attacks against a CA or repository manager can affect the RPKI and routing decisions based on RPKI data.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8211"/>
          <seriesInfo name="DOI" value="10.17487/RFC8211"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="routing-history" target="https://stat.ripe.net/docs/02.data-api/routing-history.html">
          <front>
            <title>routing history</title>
            <author>
              <organization>RIPE NCC</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="service-outage" target="https://www.nic.ad.jp/en/topics/2020/20200521-01.html">
          <front>
            <title>Service outage Roaweb and rpki repository (resolved)</title>
            <author>
              <organization>JAPNIC</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="disk-outage" target="https://www.nic.ad.jp/en/topics/2022/20220202-01.html">
          <front>
            <title>Service outage Disk full caused lost roa validity</title>
            <author>
              <organization>JAPNIC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="routinator" target="https://github.com/NLnetLabs/routinator">
          <front>
            <title>Routinator</title>
            <author>
              <organization>NLnet Labs</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="beyond-limits" target="https://dl.acm.org/doi/abs/10.1145/3603269.3604861">
          <front>
            <title>Beyond Limits How to Disable Validators in Secure Networks</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="stalloris" target="https://www.usenix.org/system/files/sec22fall_hlavacek.pdf">
          <front>
            <title>Stalloris RPKI Downgrade Attack</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="rpkiller" target="https://arxiv.org/pdf/2203.00993">
          <front>
            <title>rpkiller Threat Analysis from an RPKI Relying Party Perspective</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="behind-the-scenes" target="https://dl.acm.org/doi/pdf/10.1145/3548606.3560645">
          <front>
            <title>Behind the Scenes of RPKI</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="RIPE-downtime" target="https://www.ripe.net/ support/service-announcements/rsync-rpki-repository-downtime">
          <front>
            <title>Rsync rpki repository</title>
            <author>
              <organization>RIPE NCC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
